A technician wants to prevent an unauthorized host from connecting to the network via Ethernet.
Which of the following is a Layer 2 access control the technician should implement?
A . Access control lists
B . Captive portal
C . WPA2
D . Port security
Answer: D